6:1 Cloud Computing Flashcards
3 goals of securing the cloud
Confidentiality, Integrity, Availability of assets
Cloud Computing
Delivering computing resources to a remote customer over a network
Cloud Service Provider
Offers cloud computing service for sale to third parties, responsible for building and maintaining service offerings (internally or outsourcing)
Cloud Customers
Purchases cloud computing services from one/more providers
Cloud Service Partner
Provides add-on services to a cloud product (i.e. facilitating infrastructure)
CASB
Cloud Access Security Broker, Provides IAM services
On-Demand Self-Service Computing
Available when you need it
Scalability
As demand increases, can increase capacity
Horizontal Scaling
Adding more servers to pool to meet demand
Vertical Scaling
Adding more resources to existing servers to meet increased demand
Elasticity
Capable of expanding/contracting capacity quickly
Broad Network Access
Anytime, anywhere access
Measured Service
Everything done on cloud is measured, to ensure customer only pays for what is used
Multitenancy
Shared computing resources for different clients
Isolation
Actions of 1 user don’t impact the actions of another
Oversubscription
Cloud service providers can oversell their resource capabilities as the users have variable resource demands.
Resource Pooling
CPU and memory shared/can be reassigned among users
Cost-Benefit Analysis
Lists benefits and their corresponding costs of a decision
Intangible Benefits
Those that cannot be measured directly - scalability improvements, faster access to emerging technologies, increased productivity
MSPs
Managed service providers - offer information technology services to customers
MSSPs
Managed security service providers - must be carefully monitored (i.e. managing an entire security infrastructure, log monitoring)
Security as a Service
Subcategory of MSSP
CASBs
Cloud access security brokers - add a third-party security layer to the interactions that users have with other cloud services
CASB methodologies
Network Based - Sits between user and cloud service, monitoring for security issues and blocking requests
API-Based - Queries the cloud service via AP regularly to monitor for issues, sits on the cloud, but cannot real-time block requests.